WO2016193823A1 - Procédé de création et de suppression dynamique de vwlan dans un environnement de partage de réseau d'accès fixe - Google Patents

Procédé de création et de suppression dynamique de vwlan dans un environnement de partage de réseau d'accès fixe Download PDF

Info

Publication number
WO2016193823A1
WO2016193823A1 PCT/IB2016/000916 IB2016000916W WO2016193823A1 WO 2016193823 A1 WO2016193823 A1 WO 2016193823A1 IB 2016000916 W IB2016000916 W IB 2016000916W WO 2016193823 A1 WO2016193823 A1 WO 2016193823A1
Authority
WO
WIPO (PCT)
Prior art keywords
vwlan
virtual network
network operator
user equipment
information
Prior art date
Application number
PCT/IB2016/000916
Other languages
English (en)
Inventor
Haibo Wen
Shuigen Yang
Kaibin Zhang
Original Assignee
Alcatel Lucent
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent filed Critical Alcatel Lucent
Priority to EP16741984.5A priority Critical patent/EP3305010B1/fr
Priority to US15/735,747 priority patent/US11218384B2/en
Publication of WO2016193823A1 publication Critical patent/WO2016193823A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5051Service on demand, e.g. definition and deployment of services in real time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5077Network service management, e.g. ensuring proper service fulfilment according to agreements wherein the managed service relates to simple transport services, i.e. providing only network infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure generally relates to a method of creating and deleting vWLAN dynamically in a fixed access network sharing environment.
  • VAN Virtual Access Networks
  • InP Infrastructure Provider
  • VNO virtual network operators
  • the VNO provides differentiated services without depending on the physical fixed access network heavily.
  • the VNO can design its own forwarding mechanism and even protocol stack which can be specially designed for its own value-added service.
  • the VNO can ask the InP to establish its VAN to meet their subscribers' requirements.
  • the subscribers i.e. users of the VNO
  • the VNOs are not just fixed ones, but also nomadic ones.
  • FANS Fixed Access Network Sharing
  • the VNOs in order to attract more subscribers and provide better QoE to their subscribers, the VNOs always want to deploy their VANs to cover as large area as possible. Therefore, VNOs would ask the InP to deploy their VNOs in the public hotspots/hot-zones.
  • it will be beneficial to set the vWLAN of the VNO according to the dynamic change of the subscribers. Further, it is possible that one vWLAN is set by the VNO in one area where there is no VNO subscribers. This will waste many resources.
  • a method in a user equipment in a fixed access network sharing environment, of assisting an infrastructure provider and a virtual network operator to create vWLAN dynamically, comprising: receiving broadcast from an access point, wherein the broadcast includes a SSID of a public WLAN; accessing the public WLAN based on the SSID of the public WLAN; sending an authentication request to the access point, wherein the authentication request includes domain information of the virtual network operator; receiving an authentication result message from the infrastructure provider, wherein the authentication result message includes a SSID of the vWLAN; and accessing the vWLAN via the access point based on the SSID of the vWLAN.
  • a method, in an infrastructure provider in a fixed access network sharing environment, of creating vWLAN dynamically comprising: receiving an authentication request from an access node, wherein the authentication request includes domain information of a virtual network operator and location information set by the access node and/or a access point, and the location information is used to indicate location of the vWLAN; determining the virtual network operator based on the domain information of the virtual network operator, and forwarding the authentication request to the virtual network operator; receiving an indication message from the virtual network operator, wherein the indication message indicates to create the vWLAN and includes parameters of the vWLAN; creating the vWLAN with the parameters of the vWLAN at the location; and sending an authentication result message to the user equipment, wherein the authentication result message indicates the user equipment to access the vWLAN and includes a SSID of the vWLAN.
  • a method in a virtual network operator in a fixed access network sharing environment, of creating vWLAN dynamically, comprising: receiving an authentication request from an infrastructure provider, wherein the authentication request includes domain information of the virtual network operator and location information, and the location information is used to indicate location of the vWLAN; configuring parameters for the vWLAN based on the authentication request; and sending an indication message to the infrastructure provider, wherein the indication message indicates to create the vWLAN and includes the parameters of the vWLAN.
  • a method in a user equipment in a fixed access network sharing environment, of assisting an infrastructure provider and a virtual network operator to delete vWLAN dynamically, comprising: sending an indication information to the virtual network operator, when the user equipment disconnects the vWLAN, wherein the indication information indicates that the user equipment disconnects the vWLAN.
  • a method in an access point in a fixed access network sharing environment, of assisting an infrastructure provider and a virtual network operator to delete vWLAN dynamically, comprising: sending an indication information to the virtual network operator, when detecting that the user equipment disconnects the vWLAN, wherein the indication information indicates that the user equipment disconnects the vWLAN.
  • a method, in a virtual network operator in a fixed access network sharing environment, of deleting vWLAN dynamically comprising: receiving an indication information from a user equipment or an access point of the vWLAN, which indicates that the user equipment disconnects the vWLAN; subtracting the number of the authorized user equipments of the vWLAN by one based on the indication information; checking whether the number of the authorized user equipments is zero; sending a vWLAN deletion command to the infrastructure provider if the number of the authorized user equipments is zero, and the vWLAN deletion command includes a SSID and location of the vWLAN; and receiving a vWLAN deletion acknowledgement from the infrastructure provider, which indicates that the vWLAN is deleted successfully.
  • a method, in an infrastructure provider in a fixed access network sharing environment, of deleting vWLAN dynamically comprising: receiving a vWLAN deletion command from a virtual network operator, wherein the vWLAN deletion command includes a SSID and location of the vWLAN; deleting the vWLAN based on the vWLAN deletion command; and sending a vWLAN deletion acknowledgement to the virtual network operator, which indicates that the vWLAN is deleted successfully.
  • vWLAN can be created/deleted dynamically, such that the vWLAN of the VNO can be utilized efficiently.
  • the VNO can deploy its vWLANs in the hotspots dynamically according to the requirement.
  • the flexibility is enhanced, while the requirement for the VNO and actual subscription is met.
  • the present invention can absorb more nomadic subscribers and can save CAPEX of the VNO.
  • Figure 1 shows an architecture diagram for a Fixed Access Network Sharing environment according to an embodiment of the present invention
  • Figure 2 shows a flowchart for a method of creating a vWLAN in a Fixed Access Network Sharing environment according to an embodiment of the present invention
  • Figure 3 shows a flowchart for a method of deleting a vWLAN in a Fixed Access Network Sharing environment according to an embodiment of the present invention.
  • a public physical WLAN is deployed on each InP's Wi-Fi Access Point (AP) by the InP.
  • AP Wi-Fi Access Point
  • other vWLANs will be created for the VNO dynamically on demand. This means that InP creates/deletes the vWLAN for a VNO upon receiving the corresponding command from the VNO.
  • the VNO maintains information for the existing vWLAN for each location. This could be implemented by creating a vWLAN information table, for example. This vWLAN information table includes the information associated with each vWLAN managed by the VNO (This would be discussed in detail in the following).
  • the user equipment If not scanning the desired VNO's vWLAN, the user equipment firstly accesses via InP's public WLAN, which helps it access the desired VNO's vWLAN then.
  • This vWLAN may have been created at this location or will be dynamically created then.
  • Each AP broadcasts the InP's public WLAN's default SSID (Service Set Identifier) in the WLAN Beacon frame.
  • the SSIDs for the active vWLANs, which have already been created at this location, can also be optionally broadcast.
  • a user equipment can firstly access the network via the SSID of the public WLAN, and send an authentication request.
  • the InP's controller (or the Control & Management Platform, InP-CMP) will send this authentication request and the related location information to the corresponding VNO.
  • This corresponding VNO can be determined by the domain information in the authentication request, for example.
  • VNO's Control & Management Platform (VNO-CMP) will authenticate whether this user equipment is its subscriber, and determine whether a new vWLAN should be created on this location.
  • the InP-CMP Upon receiving the authentication pass and creating vWLAN message from the VNO-CMP, the InP-CMP will create a new vWLAN for this VNO. This could be created with the vWLAN parameters specified by the VNO, for example. Then, the In-CMP will help this user equipment to access this new created vWLAN. Alternatively, if the authentication fails, the service for the user equipment will be rejected.
  • Figure 1 shows an architecture diagram for a Fixed Access Network Sharing environment according to an embodiment of the present invention. Each element in Fig. 1 will be described with respect to Fig. 1 in the following.
  • the InP's fixed access network provides multiple network slices to meet different VNOs' requirements. This is realized by a specified coverage and topology, for example. In this progress, it also includes creating the needed vWLANs in the corresponding hotspots/hot-zones.
  • the InP-CMP includes a SDN controller, an AAA server and a DHCP server and etc.
  • the SDN controller implements all the control plane functions of the access network.
  • the SDN controller has communication interfaces to other auxiliary servers (e.g., AAA server and DHCP server).
  • the SDN controller has the following functions: (1) control/manage all the network elements in the access network; (2) VAN computation and creation for VNO; (3) vWLAN creation/deletion management.
  • the AAA server and the DHCP server help to control, manage the physical fixed access network.
  • the AAA server in the InP can interactively contact with the VNO's AAA server for further check/authentication.
  • these severs may be implemented as logical modules in the SDN controller, too.
  • the WiFi APs in Fig. 1 are controlled by the InP-CMP (SDN controller, for example) to implement (create or delete, for example) the needed vWLAN of the VNO.
  • the InP-SSID for the public WLAN is broadcast via a Wi-Fi Beacon frame.
  • the SSIDs of the vWLANs of the VNO may be either broadcast or not on this AP.
  • Fig. 1 also shows other network elements in the data plane.
  • Access nodes (ANs) (which are connected with multiple APs, for example) and switches in the data plane are controlled/managed by the SDN controller.
  • VNOs' VANs are established on these network elements and the related links if needed.
  • the network managed by the VNO includes at least one VAN in the InP's fixed access network and the vWLAN, which belongs to the VAN (In reality, the VAN includes the vWLANs belonging to this VNO).
  • This VAN has its own logical control/management platform (VNO-CMP), including the AAA server, the DHCP server. Those servers are used to control/manage VNO's network and its VAN, and the subscribers of this VNO.
  • VNO-CMP logical control/management platform
  • a vWLAN information table of the vWLAN managed by a VNO is configured in the VNO.
  • the VNO stores and tracks the information of the active vWLAN in the fixed access network of the InP.
  • the VNO can dynamically send request to the InP to create/delete some vWLANs on some locations.
  • Each VNO maintains the information about its vWLANs. This information includes the location, the SSID of vWLAN (vWLAN-SSID), whether to broadcast the SSID of vWLAN or not, the number of authorized subscribers, encryption method, bandwidth and etc.
  • Table 1 shows an example for a vWLAN information table of a VNO.
  • the VNO When the number of the authorized subscribers becomes zero, the VNO will indicate the InP to delete the corresponding vWLAN.
  • Figure 2 shows a flowchart for a method of creating a vWLAN in a Fixed Access Network Sharing environment according to an embodiment of the present invention.
  • Fig. 2 is based on the following scenario, for example: one new user equipment appears in a hotspot of a certain VNO, and thereby a vWLAN will be created for this user equipment dynamically on demand.
  • the user equipment i of the VNO moves to a hotspot and wants the service from the desired VNO, while the VNO has no vWLAN in this hotspot at this moment and thereby will create a new vWLAN dynamically.
  • the AP of the public WLAN (API as shown in Fig. l , for example) will broadcast the SSID of the public WLAN.
  • This will be implemented by either a Beacon frame or a Probe Response frame.
  • the user equipment i will scan this broadcast signal to obtain the SSID of the public WLAN.
  • This public WLAN is a physical WLAN deployed by the InP, the SSID of which is set by the InP, for example.
  • the SSID of this public WLAN can be referred as InP-SSID, as shown in Fig. l
  • step S202 if the user equipment i scans and finds the SSID of the vWLAN of its desired VNO, the method goes to step S211. This means that the user equipment will use the SSID of the vWLAN directly to access the vWLAN of its desired VNO.
  • step S203 If the user equipment i scans and does not find the SSID of the vWLAN of its desired VNO in the broadcast, the method goes to step S203. This means that the method will goes directly to step S203 when the broadcast of the AP does not include the SSID of the vWLAN of the VNO (This vWLAN does not exist, or the SSID of this vWLAN has not been broadcast due to the VNO policy, even this vWLAN exists, for example.).
  • step S203 the user equipment i accesses the public WLAN deployed by the InP via the SSID of the public WLAN. Specifically, in this step, the corresponding authentication will be conduct based on 802.11 protocol.
  • step S204 the user equipment i sends an authentication request to the AP.
  • This authentication request can be sent in the form of user@domain, for example.
  • This authentication request (user@domain) includes the domain information of the VNO (the ID of the VNO, for example), for example. Additionally, this authentication request further includes credential information which enables the VNO to determine whether the user equipment is its subscriber, for example, user equipment account, password and certificate and etc.
  • This authentication request will be processed by the AP and the AN (API and AN1 shown in Fig. l , for example), and sent to InP-CMP, for example sent to the AAA server in the InP-CMP.
  • the AP and the AN can identify the location information of the vWLAN needed to be created and insert it into the above authentication request. In one embodiment of the present invention, the AP and the AN can insert the respective identification into the above authentication request. This location information can be then used to help the VNO-CMP to determine the location of the vWLAN needed to be created.
  • step S205 based on the domain information of the VNO, the InP-CMP will determine the corresponding VNO, and send the above authentication request to the VNO-COMP for further authentication.
  • the above location information can be processed by the InP into readable location information.
  • the authentication information can also be checked and/or authenticated by the AAA server in the InP.
  • step S206 the VNO-CMP will determine whether the user equipment i is a VNO subscriber based on the credential information in the authentication request. This would be conduct by the proper module in the VNO-CMP, for example, or by the AAA server. If the user equipment is not the subscriber, the VNO-CMP will not serve it, that is, no vWLAN will be created for it.
  • the VNO-CMP will determine whether a vWLAN exists at the location according to the location information in the authentication request.
  • the VNO-CMP will send an access allowing message to the InP-CMP.
  • the InP-CMP will in turn send the SSID of the vWLAN to the user equipment i to help it access to the vWLAN of the VNO.
  • the VNO-CMP will update its maintained vWLAN information table actually. For example, the VNO-CMP will add the number of the authorized user equipments by one.
  • the VNO-CMP will insert a new entry related to this vWLAN in its maintained vWLAN information table, and configure suitable parameters for this vWLAN, as shown in Table 2.
  • step S207 the VNO-CMP sends an indication message to the InP-CMP, which indicate to create the vWLAN and that the user equipment i is allowed to access the vWLAN. Moreover, the indication message further includes the parameters for this vWLAN.
  • step S208 the InP-CMP will create this vWLAN with the parameters of the vWLAN on the corresponding location based on the indication message. This could be implemented by the SDN controller, for example.
  • the SSID will be allocated to the vWLAN, the policy will be made for the vWLAN and etc.
  • the InP-CMP can command the AP to create the corresponding vWLAN based on the indication message of the VNO.
  • the InP-CMP will send a vWLAN creation completion acknowledgment to the VNO-CMP to indicate that the creation of the vWLAN is completed.
  • step S210 the InP-CMP sends the authentication result message to the user equipment i.
  • This authentication result message indicates the user equipment to access the vWLAN and includes the SSID of the created vWLAN.
  • step S211 the user equipment i assesses the vWLAN of its desired VNO based on the SSID of the vWLAN.
  • step S212 the user equipment will interact with the VNO-CMP. In this step, any necessary operations will be conduct. For example, the user equipment i communicates with its desired VNO to conduct further authentication and address allocation. After this step, the user equipment i can enjoy the service from its desired VNO via the new created vWLAN.
  • Figure 3 shows a flowchart for a method of deleting a vWLAN in a Fixed Access Network Sharing environment according to an embodiment of the present invention.
  • vWLAN deletion can be separated into two scenarios.
  • the subscriber when a subscriber disconnects the vWLAN, the subscriber can send the corresponding message to the VNO-CMP.
  • the subscriber will not send the message actively.
  • the corresponding AP which manages the vWLAN, detects that the subscriber disconnects the vWLAN, and reports to the VNO-CMP.
  • step S301 once a subscriber/user equipment dis-attaches from a vWLAN, it will send an indication information to the VNO-CMP, which indicates that the subscriber disconnects/dis-attaches from the vWLAN.
  • the subscriber will send a DHCP release message to the DHCP server in the VNO-CMP. For example, the related network resources, IP address and etc. are indicated to be released.
  • step S302 upon receiving the above indication information, the VNO-CMP will subtract the number of the authorized user equipments of the vWLAN by one.
  • step S303 the VNO-CMP will check whether the current number of the authorized user equipments of the vWLAN is zero. That is, the VNO-CMP will check whether there is no subscriber/user equipment for this vWLAN yet.
  • step S304 if the current number of the authorized user equipments of the vWLAN is zero, the VNO-CMP will send a vWLAN deletion command to the InP-CMP, which includes the SSID of the vWLAN and the location. Preferably, the VNO-CMP will remove the entry of this vWLAN in the vWLAN information table.
  • step S305 the InP-CMP will command to delete the vWLAN in the corresponding location based on the vWLAN deletion command, so as to release the corresponding resources.
  • the In-CMP will indicate the related AP to delete the vWLAN, for example, based on the deletion command.
  • step S306 the InP-CMP will send a vWLAN deletion acknowledgment to the VNO-CMP, which indicates that the vWLAN is deleted successfully.
  • the AP managing the vWLAN will send an indication information to the VNO-CMP, which indicates VNO that the subscriber de-attaches the vWLAN of the VNO. For example, the AP can detect the idle timeout for the subscriber to determine whether the subscriber de-attaches from the vWLAN.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé, dans un environnement de partage de réseau d'accès fixe, de création/suppression dynamique de réseau local sans fil virtuel (vWLAN). La présente invention décrit une nouvelle procédure d'interaction entre un équipement d'utilisateur, un fournisseur d'infrastructure, un opérateur de réseau virtuel et un nœud d'accès correspondant et un point d'accès correspondant. Ainsi, le vWLAN peut être créé et supprimé de manière dynamique pour l'opérateur de réseau virtuel, de telle sorte que le vWLAN de l'opérateur de réseau virtuel peut être utilisé efficacement. Ainsi, l'opérateur de réseau virtuel peut déployer ses vWLAN dans les points actifs de manière dynamique selon le besoin. La flexibilité est améliorée, alors que la nécessité d'abonnement effectif et de l'opérateur de réseau virtuel est remplie.
PCT/IB2016/000916 2015-06-02 2016-05-30 Procédé de création et de suppression dynamique de vwlan dans un environnement de partage de réseau d'accès fixe WO2016193823A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP16741984.5A EP3305010B1 (fr) 2015-06-02 2016-05-30 Procédé de création et de suppression dynamique de vwlan dans un environnement de partage de réseau d'accès fixe
US15/735,747 US11218384B2 (en) 2015-06-02 2016-05-30 Method of creating and deleting vWLAN dynamically in a fixed access network sharing environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510296416.7 2015-06-02
CN201510296416.7A CN106231605B (zh) 2015-06-02 2015-06-02 在共享式固定接入网中用于动态创建和删除vWLAN的方法

Publications (1)

Publication Number Publication Date
WO2016193823A1 true WO2016193823A1 (fr) 2016-12-08

Family

ID=56511819

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2016/000916 WO2016193823A1 (fr) 2015-06-02 2016-05-30 Procédé de création et de suppression dynamique de vwlan dans un environnement de partage de réseau d'accès fixe

Country Status (4)

Country Link
US (1) US11218384B2 (fr)
EP (1) EP3305010B1 (fr)
CN (1) CN106231605B (fr)
WO (1) WO2016193823A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118050A1 (fr) * 2016-12-21 2018-06-28 Intel Corporation Fonction de réseau virtuel (vnf) de point d'accès wi-fi communautaire avec fonction d'intercommunication à accès protégé wi-fi 2 (wpa2)
WO2018118051A1 (fr) * 2016-12-21 2018-06-28 Intel Corporation Partitionnement fonctionnel dynamique pour fonction de réseau virtuel (vnf) de passage d'accès protégé wi-fi 2 (wpa2)
WO2018182604A1 (fr) * 2017-03-30 2018-10-04 Intel Corporation Virtualisation par passage d'accès protégé wifi 2 (wpa2)
CN108882344A (zh) * 2018-06-05 2018-11-23 深圳市泰和安科技有限公司 一种无线设备的网络接入方法、装置及系统
US10785683B2 (en) 2017-03-30 2020-09-22 Maxlinear, Inc. Native fragmentation in WiFi protected access 2 (WPA2) pass-through virtualization protocol

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108770021B (zh) * 2018-07-09 2021-11-12 常熟理工学院 一种应用于超密集异构网络的基于同频干扰管理的多业务虚拟网络配置方法
US11290910B2 (en) * 2020-01-31 2022-03-29 Dell Products, Lp System and method for prioritization of network traffic across multiple wireless options
US11520615B1 (en) 2020-03-31 2022-12-06 Equinix, Inc. Virtual network function virtual domain isolation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004013986A1 (fr) * 2002-08-02 2004-02-12 Cisco Technology, Inc. Procede servant a regrouper des station 802.11 en ensembles de services autorises afin de differentier l'acces au reseau et les services
WO2004073237A2 (fr) * 2003-02-06 2004-08-26 Symbol Technologies, Inc. Reseaux locaux sans fil virtuels
US20090067436A1 (en) * 2007-09-07 2009-03-12 Trapeze Networks, Inc. Network assignment based on priority
US7535880B1 (en) * 2005-01-13 2009-05-19 2Wire, Inc. Method and apparatus for controlling wireless access to a network
US20090181641A1 (en) * 2008-01-11 2009-07-16 Trevor Fiatal Mobile virtual network operator
US20130283050A1 (en) * 2012-04-23 2013-10-24 Anil Gupta Wireless client authentication and assignment
WO2014049432A2 (fr) * 2012-09-29 2014-04-03 Alcatel Lucent Procédé fonctionnant dans un réseau d'accès fixe et des équipements utilisateur

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6847620B1 (en) * 1999-05-13 2005-01-25 Intermec Ip Corp. Mobile virtual LAN
JP4738901B2 (ja) * 2005-06-07 2011-08-03 株式会社日立製作所 Vlanid動的割当方法及びパケット転送装置
US7733802B2 (en) * 2005-09-15 2010-06-08 Tp Lab, Inc. Method to dynamically create a virtual network
US8363658B1 (en) * 2008-11-13 2013-01-29 Sprint Communications Company L.P. Dynamic firewall and dynamic host configuration protocol configuration
US8379652B2 (en) * 2009-05-14 2013-02-19 Avaya Inc. Methods, apparatus and computer readable medium for conveying virtual local area network (VLAN) policies from designated to roamed network
US9356817B2 (en) * 2012-04-30 2016-05-31 Aruba Networks, Inc. System and method for mitigating multicast message duplication in a wireless network
US20140127994A1 (en) * 2012-11-07 2014-05-08 Microsoft Corporation Policy-based resource access via nfc
US9408249B2 (en) * 2013-12-03 2016-08-02 Cisco Technology, Inc. Wireless mesh network including resilient backhaul links and WLAN traffic local switching
US10142342B2 (en) * 2014-03-23 2018-11-27 Extreme Networks, Inc. Authentication of client devices in networks
US20160226790A1 (en) * 2015-01-30 2016-08-04 Comcast Cable Communications, Llc Provisioning and managing resources

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004013986A1 (fr) * 2002-08-02 2004-02-12 Cisco Technology, Inc. Procede servant a regrouper des station 802.11 en ensembles de services autorises afin de differentier l'acces au reseau et les services
WO2004073237A2 (fr) * 2003-02-06 2004-08-26 Symbol Technologies, Inc. Reseaux locaux sans fil virtuels
US7535880B1 (en) * 2005-01-13 2009-05-19 2Wire, Inc. Method and apparatus for controlling wireless access to a network
US20090067436A1 (en) * 2007-09-07 2009-03-12 Trapeze Networks, Inc. Network assignment based on priority
US20090181641A1 (en) * 2008-01-11 2009-07-16 Trevor Fiatal Mobile virtual network operator
US20130283050A1 (en) * 2012-04-23 2013-10-24 Anil Gupta Wireless client authentication and assignment
WO2014049432A2 (fr) * 2012-09-29 2014-04-03 Alcatel Lucent Procédé fonctionnant dans un réseau d'accès fixe et des équipements utilisateur

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118050A1 (fr) * 2016-12-21 2018-06-28 Intel Corporation Fonction de réseau virtuel (vnf) de point d'accès wi-fi communautaire avec fonction d'intercommunication à accès protégé wi-fi 2 (wpa2)
WO2018118051A1 (fr) * 2016-12-21 2018-06-28 Intel Corporation Partitionnement fonctionnel dynamique pour fonction de réseau virtuel (vnf) de passage d'accès protégé wi-fi 2 (wpa2)
US11096119B2 (en) 2016-12-21 2021-08-17 Maxlinear, Inc. Dynamic functional partitioning for WiFi protected access 2 (WPA2) pass-through virtual network function (VNF)
US11102176B2 (en) 2016-12-21 2021-08-24 Maxlinear, Inc. Community WiFi access point (AP) virtual network function (VNF) with WiFi protected access 2 (WPA2) pass-through
US11711754B2 (en) 2016-12-21 2023-07-25 Maxlinear, Inc. Dynamic functional partitioning for security pass-through virtual network function (VNF)
WO2018182604A1 (fr) * 2017-03-30 2018-10-04 Intel Corporation Virtualisation par passage d'accès protégé wifi 2 (wpa2)
US10785683B2 (en) 2017-03-30 2020-09-22 Maxlinear, Inc. Native fragmentation in WiFi protected access 2 (WPA2) pass-through virtualization protocol
CN108882344A (zh) * 2018-06-05 2018-11-23 深圳市泰和安科技有限公司 一种无线设备的网络接入方法、装置及系统
CN108882344B (zh) * 2018-06-05 2021-08-06 深圳市泰和安科技有限公司 一种无线设备的网络接入方法、装置及系统

Also Published As

Publication number Publication date
US20180139095A1 (en) 2018-05-17
US11218384B2 (en) 2022-01-04
EP3305010B1 (fr) 2020-09-23
CN106231605A (zh) 2016-12-14
EP3305010A1 (fr) 2018-04-11
CN106231605B (zh) 2019-10-29

Similar Documents

Publication Publication Date Title
US11218384B2 (en) Method of creating and deleting vWLAN dynamically in a fixed access network sharing environment
CN109842906B (zh) 一种通信的方法、装置及系统
US10313997B2 (en) User equipment registration method for network slice selection and network controller and network communication system using the same
JP7030169B2 (ja) サブネットワークを有する通信ネットワークにおける通信のための通信システム
WO2018145654A1 (fr) Procédé et dispositif de mise en oeuvre de gestion multi-accès, et support de stockage informatique
US20200128614A1 (en) Session processing method and device
KR102445355B1 (ko) 사용자 그룹에 대한 세션 관리 방법 및 장치
US10925100B2 (en) Method for assigning a sub-network to a communication terminal
EP3046351B1 (fr) Procédé et système pour réaliser une fonction de talkie-walkie sur wifi
JP2015524234A (ja) ワイヤレス・ローカル・エリア・ネットワークへの高度なネットワーク・ハンドオフのためのシステムおよび方法
US11871223B2 (en) Authentication method and apparatus and device
JP6649493B2 (ja) 通信ネットワークを介して通信端末の通信接続を確立する方法
CN111757424B (zh) 一种无线接入网的共享方法及装置
KR101460766B1 (ko) 무선 네트워크 시스템에서 클러스터 기능을 이용한 보안설정 시스템 및 그 제어방법
KR20240060592A (ko) 통신 방법 및 장치
CN113473569B (zh) 应用服务器的发现方法及相关装置
CN112956253A (zh) 用于将用户设备附着到网络切片的方法和装置
CN116349197A (zh) 一种切片隔离方法、装置及系统
EP2979436B1 (fr) Gestion des ressources d'un réseau local sans fil dans un système de réseau d'accès
CN105493540A (zh) 一种无线局域网用户侧设备及信息处理方法
CN107666443B (zh) 一种报文转发方法及装置
CN115499894A (zh) 网络切片调整方法、装置及设备
KR20220152950A (ko) 네트워크 슬라이스 승인 제어(nsac) 발견 및 로밍 향상들
CN114500175A (zh) 基于用户设备ip地址反向划分归属vlan的通信方法
CN116233953A (zh) 数据传输方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16741984

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 15735747

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2016741984

Country of ref document: EP